SHI International Malware Attack: 5 Big Things To Know
Mark Haranas, Jay Fitzgerald
From delays to restoring some systems to potential impact on customers, here are five things customers and partners need to know about the recent malware cyberattack on SHI International.
The Malware Attack On SHI
A day after confirming it was hit by a “coordinated and professional malware attack” over the Fourth of July holiday weekend, IT solution provider powerhouse SHI International has remained largely mum about what’s happening.
The Somerset, N.J.-based company’s website is still largely down, except for a simple black-and-white text message posted on the website’s front page that briefly explains the nature and impact of the “recent security incident.’”
In the website message and a separate blog post, SHI—a $12 billion private company with more than 5,000 employees worldwide—tries to reassure the public that its security experts are handling the issue. It added there’s “no evidence to suggest that customer data was exfiltrated during the attack” and that “no third-party systems in the SHI supply chain were affected.”
In fact, earlier this year various government agencies from across the globe—included the FBI and National Security Agency (NSA)—warned they were observing an increase in cyberattacks targeting MSPs.
The United Kingdom, Australian, Canadian, New Zealand, and U.S. cybersecurity authorities said they “expect malicious cyber actors—including state-sponsored advanced persistent threat (APT) groups—to step up their targeting of MSPs in their efforts to exploit provider-customer network trust relationships,” said the cybersecurity agencies in a joint statement in May.
SHI, ranked No. 13 on CRN’s 2022 Solution Provider 500 list, provides services to more than 15,000 enterprise, public sector and academic customer organizations around the world.
CRN breaks down the five biggest things SHI customers and partners need to know about the malware attack and the thoughts of security experts about the nature of the attack.